
Hijacked by Hackers
Be Afraid. Be Very, Very Afraid.
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Ken Maxon
-
By:
-
Michael Klein
About this listen
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll hear stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets. Most importantly, you learn about how you can protect your personal and professional data from the secret attacks of viruses, worms, malware, and ransomware.
When going deep, you'll get a glimpse of what it's like to be a "dark trader" on the black market. You'll be privy to the processes and exchanges used in a hacker's world that you may never have known existed. Hearing this book will make you more aware of all the possible places and ways hackers use to gain access to your name, phone number, address, military or prison records, credit card numbers, bank accounts, passwords, and even the sites you browse in the privacy of your home. The hacker is almost always lurking beneath the surface, watching for your vulnerable spot.
It's an educational, exciting, and fun listen. So, enjoy the guided tour through the underworld of the hacker.
©2016 Michael Klein (P)2016 Michael KleinListeners also enjoyed...
-
Social Media Scams: Protect Yourself from Scams
- By: Susan Zeppieri, Francis Zeppieri
- Narrated by: David Van Der Molen
- Length: 1 hr and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you ever come across something online that looks a little bit too good to be true? It might be a competition you’ve won that you didn’t know you’d entered or a new cryptocurrency with a low buy-in price and promised high returns.
By: Susan Zeppieri, and others
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
-
Very good book
- By Jay Grey on 08-19-23
By: Scott N. Schober
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
Digital Gold
- Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money
- By: Nathaniel Popper
- Narrated by: Robert Fass
- Length: 10 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.
-
-
Informative, but dry
- By Tomer on 05-10-16
By: Nathaniel Popper
-
Social Media Scams: Protect Yourself from Scams
- By: Susan Zeppieri, Francis Zeppieri
- Narrated by: David Van Der Molen
- Length: 1 hr and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you ever come across something online that looks a little bit too good to be true? It might be a competition you’ve won that you didn’t know you’d entered or a new cryptocurrency with a low buy-in price and promised high returns.
By: Susan Zeppieri, and others
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
-
Very good book
- By Jay Grey on 08-19-23
By: Scott N. Schober
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
Digital Gold
- Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money
- By: Nathaniel Popper
- Narrated by: Robert Fass
- Length: 10 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.
-
-
Informative, but dry
- By Tomer on 05-10-16
By: Nathaniel Popper
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
-
Scams
- Uncover Scams, Lies, Frauds, and Deceit
- By: Cammy Fetchens
- Narrated by: Randy Fuller
- Length: 2 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
For all you gullible people out there: Yes, there are lots and lots and lots of scams. And you’ve probably fallen for one or two in the past. If not, great. If you have, then this is just another reason to listen to this guide: so you won’t fall into the snares of the scammers ever again. In this audiobook, the sad, bad side of society will be highlighted. The obscure will be exposed. The sneaky snake oil salesmen will be called out for what they are.
-
-
Cool
- By Steven on 04-21-20
By: Cammy Fetchens
-
The Starfish and the Spider
- The Unstoppable Power of Leaderless Organizations
- By: Ori Brafman, Rod Beckstrom
- Narrated by: Sean Pratt
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you cut off a spider's leg, it's crippled; if you cut off its head, it dies. But if you cut off a starfish's leg it grows a new one, and the old leg can grow into an entirely new starfish. The Starfish and the Spider argues that organizations fall into two categories: "spiders", which have a rigid hierarchy, and "starfish", which rely on the power of peer relationships.
-
-
Centralized and decentralized models
- By Chan Meng on 12-07-07
By: Ori Brafman, and others
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- By: Keith Martin
- Narrated by: Matthew Waterson
- Length: 7 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online.
-
-
Greatly enjoyed and learned
- By Glenn Nunes on 03-30-21
By: Keith Martin
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- By: Parmy Olson
- Narrated by: Abby Craden
- Length: 14 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In late 2010, thousands of hacktivists joined a mass digital assault by Anonymous on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Splinter groups then infiltrated the networks of totalitarian governments in Libya and Tunisia, and an elite team of six people calling themselves LulzSec attacked the FBI, CIA, and Sony. They were flippant and taunting, grabbed headlines, and amassed more than a quarter of a million Twitter followers.
-
-
Interesting book, AWFUL narration
- By Jen on 11-11-14
By: Parmy Olson
-
The Devil Inside the Beltway
- The Shocking Expose of the US Government's Surveillance and Overreach Into Cybersecurity, Medicine and Small Business
- By: Michael J. Daugherty
- Narrated by: Clay Teunis
- Length: 15 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Small business owner Michael J. Daugherty is fighting back against US Government's sinister surveillance tactics in his audiobook, The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach into Cybersecurity, Medicine, and Small Business. During the past decade the US Government has teamed with private enterprise and academia to attack American small business by surveilling networks and picking up Americans' files they considered to be "shared" and "vulnerable."
-
-
One of the most frustrating books I have heard
- By Theresa on 04-18-15
What listeners say about Hijacked by Hackers
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- robc
- 07-10-20
Dated and cliche
I picked this book up as it was on sale. I have to admit that I would not have added it to my reading list had it not have been on sale.
This book would only be useful to the most novice of computer users - those that previously knew absolutely nothing about computer security.
The author's portrayal of the motivation of hackers and their typical psyche is very dated and cliche. Although there was limited mention of cyber criminals, the author too often blurred the lines between cyber criminals and hackers.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Holly Cresong
- 11-05-16
Arthur extremely butt hurt
It is in my opinion rhat this Arthur was extremely butthurt about being hacked. Spent a lot of time and money and got nowheres so decided to write a book about it. I found it to be slightly interesting. nothing more.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!